11
Kia Silverbrook, Paul Lapstun, Jacqueline Anne Lapstun: Method and system for banking. Silverbrook Research, July 29, 2008: US07406445 (7 worldwide citation)

Methods and systems are disclosed which relate to online banking via interface surfaces printed with information and coded data. The coded data, encoded visibly or invisibly, may be queried by an appropriate sensing device. The sensing device communicates with a computer system. Together, the interf ...


12
Kennard L Wottowa, Michael Henry, William E Storts: Account and customer creation in an on-line banking model. Accenture, Finnegan Henderson Farabow Garrett & Dunner, October 12, 2010: US07813983 (7 worldwide citation)

A system, method and article of manufacture are provided for account and customer creation in an online banking model. An application is received from a customer. The application includes information relating to the user and also documentation relating to the user. A first computer is utilized to cr ...


13
Au Kean Hoe: Method of secure payment over a network. Au Kean Hoe, WYATT David Alan, December 21, 2007: WO/2007/144708 (6 worldwide citation)

A secure transaction is carried out by a merchant application which provides details of the customer bank and the transaction amount to a host system (104) and receives a transaction identifier. The merchant provides the customer with the identifier. The customer uses the bank's online banking and e ...


14
Matthew Brezina, Adam Smith: Presentation of organized personal and public data using communication mediums. YAHOO, James J DeCarlo, Greenberg Traurig, February 28, 2017: US09584343 (5 worldwide citation)

Systems, methods and computer program products for providing information associated with an attachment (e.g., attachment received through an instant message system, online collaboration tool, electronic message and the like). A sidebar may allow a user to view comprehensive profile and content infor ...


15
Justin D Call, Subramanian Varadarajan, Xiaochan Huang, Xiaoming Zhou, Marc R Hansen: Detecting the introduction of alien content. J Johnson, March 28, 2017: US09609006 (5 worldwide citation)

A computer-implemented method for identifying abnormal computer behavior includes receiving, at a computer server subsystem, data that characterizes subsets of particular document object models for web pages rendered by particular client computers; identifying clusters from the data that characteriz ...


16
Jonathan D Main: Computerized banking device and method of use. White Welker & Welker, June 17, 2008: US07387237 (5 worldwide citation)

The present invention is banking device that has a slot on the top surface to accept coins and contains therein a locking reservoir for the collection of change. A money sorter is used to count the deposited money. The reservoir is “keyed” and can only be opened by the local bank, where an account i ...


17
Delaram Fakhrai, Mehran Moshfeghi: Method and system for improved security utilizing location based services for authentication. GOLBA, Adeli, December 22, 2015: US09218480 (5 worldwide citation)

An improved authentication method and system is provided where a user securely accesses a variety of target servers for online email, online banking, credit card purchases, ecommerce, brokerage services, corporate databases, and online content (movies, music and software). The method involves a brid ...


18
Brian Colella: System for secure online selling, buying and bill pay in an electronic commerce setting. Ober Kaler, Royal W Craig, May 24, 2011: US07949609 (5 worldwide citation)

A method and system for biometric-secure online selling, buying and bill paying in electronic commerce and retail point-of-sale settings that also simplifies the checkout process and eliminates fraudulent transactions. The system relies on an exchange service provider (ESP) that hosts multiple serve ...


19
Michael Burger, Mark Joseph Kapczynski: Systems and methods of identity protection and management. Consumerinfo com, Knobbe Martens Olson & Bear, January 10, 2017: US09542553 (4 worldwide citation)

In an embodiment, a computing system, such as a monitoring computer, receives a request from a user to monitor an account of the user with an online service provider. The request may include personal information and user preferences for one or more protective actions. The system periodically monitor ...


20
Hans Martin Boesgaard Sørensen: Digital data authentication. Codesealer APS, Harness Dickey & Pierce, June 18, 2013: US08468351 (4 worldwide citation)

A method for protecting a digital document and user data typed into a digital document is presented. The method comprises computation of an authentication tag when the document is sent from a server. A similar authentication tag is computed when the document is shown on a client. When another docume ...



Click the thumbnails below to visualize the patent trend.